Information environment security analysis method and system for mobile internet

A mobile Internet and information environment technology, applied in security devices, wireless communications, advanced technologies, etc., can solve the problems of illegal information interception, interception, increased tampering, high channel risk, and inability to truly restrict other devices, so as to maintain flexibility. performance and economy, and the effect of reducing the amount of computation

Pending Publication Date: 2021-01-15
深圳市众云网有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

From the perspective of signal transmission, the mobile Internet uses wireless communication, so the risk of the channel is relatively high. On the one hand, it cannot really restrict the access of other devices, including some malicious devices or devices with obvious security risks. On the other hand, The probability of information being illegally monitored, intercepted, and tampered with has increased significantly

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information environment security analysis method and system for mobile internet
  • Information environment security analysis method and system for mobile internet
  • Information environment security analysis method and system for mobile internet

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for the convenience of description, only the parts related to the related invention are shown in the drawings.

[0031] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0032] Such as figure 1 As shown, it is a schematic diagram of the network structure of the mobile Internet according to Embodiment 1 of the present application. As shown in the figure, the network structure of the mobile Internet is divided into mobile terminals, access po...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides an information environment security analysis method and system of a mobile internet. According to the application, a virtual verification node can be insertedinto any network node, especially a wireless access point, in a mobile internet architecture, information environment security monitoring and evaluation oriented to the network node is achieved through the virtual verification node, and according to the result of the information environment security monitoring and evaluation, an information security policy of the network node is set. According tothe invention, a monitoring analysis mechanism capable of being inserted and withdrawn instantly is achieved, the negative influence of information security environment monitoring analysis on the calculation amount and the energy consumption is reduced, the characteristic of various changes of a mobile internet network architecture is met, and the monitoring and analysis of the mobile internet information security environment can be achieved. Meanwhile, necessary flexibility and economization are kept.

Description

technical field [0001] The present application relates to the technical field of the mobile Internet, and in particular to a method and system for analyzing the security of the information environment of the mobile Internet. Background technique [0002] Mobile Internet is a new form of deep integration of mobile digital communication technology and Internet services. Through the rapid development in recent years, it has profoundly changed the information dissemination mode and business service mode of human society. [0003] Information security is a problem that any network and communication system must face and solve. With the deepening and popularization of the mobile Internet, the scale of the network continues to expand, and the number of users is increasing day by day. The reliability of its information security is also receiving more and more attention. [0004] Compared with the traditional Internet, the mobile Internet has its own uniqueness in terms of terminals,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/12H04W12/121
CPCH04W12/12Y02D30/70
Inventor 刘智王林
Owner 深圳市众云网有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products